Publication number | US20060212837 A1 |

Publication type | Application |

Application number | US 11/082,592 |

Publication date | Sep 21, 2006 |

Filing date | Mar 17, 2005 |

Priority date | Mar 17, 2005 |

Also published as | US7290230 |

Publication number | 082592, 11082592, US 2006/0212837 A1, US 2006/212837 A1, US 20060212837 A1, US 20060212837A1, US 2006212837 A1, US 2006212837A1, US-A1-20060212837, US-A1-2006212837, US2006/0212837A1, US2006/212837A1, US20060212837 A1, US20060212837A1, US2006212837 A1, US2006212837A1 |

Inventors | Mukul Prasad |

Original Assignee | Prasad Mukul R |

Export Citation | BiBTeX, EndNote, RefMan |

Patent Citations (9), Referenced by (26), Classifications (4), Legal Events (6) | |

External Links: USPTO, USPTO Assignment, Espacenet | |

US 20060212837 A1

Abstract

A method for verifying a digital system design is provided. A first abstraction of a digital system design is performed to obtain an abstract model of the digital system design. One or more first steps of a multiple-step model checking process are performed using the abstract model, the multiple-step model checking process being operable to verify the digital system design. During the multiple-step model checking process, a second abstraction is performed to refine the abstract model. One or more second steps of the multiple-step model checking process are then performed using the refined abstract model.

Claims(8)

performing a first abstraction of a digital system design to obtain an abstract model of the digital system design;

performing one or more first steps of a multiple-step model checking process using the abstract model, the multiple-step model checking process operable to verify the digital system design;

during the multiple-step model checking process, performing a second abstraction to refine the abstract model; and

performing one or more second steps of the multiple-step model checking process using the refined abstract model.

at multiple points during the multiple-step model checking process, performing an additional abstraction to further refine the abstract model; and

performing one or more additional steps of the multiple-step model checking process using each of the further refined abstract models.

perform a first abstraction of a digital system design to obtain an abstract model of the digital system design;

perform one or more first steps of a multiple-step model checking process using the abstract model, the multiple-step model checking process operable to verify the digital system design;

during the multiple-step model checking process, perform a second abstraction to refine the abstract model; and

performing one or more second steps of the multiple-step model checking process using the refined abstract model.

at multiple points during the multiple-step model checking process, perform an additional abstraction to further refine the abstract model; and

perform one or more additional steps of the multiple-step model checking process using each of the further refined abstract models.

perform a first abstraction of a digital system design to obtain an abstract model of the digital system design;

perform one or more first steps of a multiple-step model checking process using the abstract model, the multiple-step model checking process operable to verify the digital system design;

during the multiple-step model checking process, perform a second abstraction to refine the abstract model; and

performing one or more second steps of the multiple-step model checking process using the refined abstract model.

at multiple points during the multiple-step model checking process, perform an additional abstraction to further-refine the abstract model; and

perform one or more additional steps of the multiple-step model checking process using each of the further refined abstract models.

means for performing a first abstraction of a digital system design to obtain an abstract model of the digital system design;

means for performing one or more first steps of a multiple-step model checking process using the abstract model, the multiple-step model checking process operable to verify the digital system design;

means for performing, during the multiple-step model checking process, a second abstraction to refine the abstract model; and

means for performing one or more second steps of the multiple-step model checking process using the refined abstract model

performing a model checking process including a plurality of steps to verify a digital system design, the model checking process using an abstract model of the digital system design including a plurality of logical state elements;

after a portion of the plurality of steps, refining the abstract model; and

continuing the model checking process using the refined abstract model.

Description

- [0001]This invention relates in general to verification of digital designs and, more particularly, to systems and methods for verifying a digital design using dynamic abstraction.
- [0002]The application of formal verification techniques, such as model checking, to real-life industrial designs, has traditionally been hampered by what is commonly known as the state explosion problem. Dramatic increases in the size of digital systems and components and the corresponding exponential increase in the size of their state space have kept industrial-size designs well beyond the capacity of current model checkers. “Abstraction refinement” has recently emerged as a promising technology that has the potential to bridge this verification gap.
- [0003]The basic idea behind abstraction refinement is to attempt to verify the property at hand on a simplified version of the given design. This simplified version, or “abstraction,” is generated by removing elements from the original design that are not relevant to the proof of the given property. If the property passes on the abstract model it is guaranteed to be true on the original design as well. However, if the property fails, counter-examples produced on the abstract model must be validated against the original design. If this is not possible, the process is iterated with another abstract model which approximates the original model more closely. The new abstract model can be obtained by embellishing the current abstraction with more details from the original design or by re-generating a more complete abstract model from the original design. Usually the challenge in abstraction refinement is to construct as small an abstract model as possible, to facilitate the model checking, while retaining sufficient detail in the abstraction to decide the property. Thus, the ideal technique for abstraction refinement is one which achieves a good balance between the size and accuracy of the abstract model.
- [0004]Abstraction refinement methods can be broadly classified into two kinds of methods, namely (1) counter-example driven and (2) counter-example independent. Counter-example driven methods for abstraction refinement typically work by iteratively refining the current abstraction so as to block a particular (false) counter-example encountered in model checking the previous abstract model. The refinement algorithm could use a combination of structural heuristics or fuictional analysis based on SAT or BDDs or some combination of these. Some recent techniques have enlarged the scope of the refinement by using multiple counter-examples from the previous abstract model.
- [0005]The basic idea of counter-example independent abstraction refinement is to perform a SAT-based bounded model check (BMC) of the property up to some depth, k, on the original design and generate the abstract model through an analysis of the proof of unsatisfiability of the BMC problem. Essentially, the abstraction excludes latches and/or gates that are not included in the proof of unsatisfiability of the BMC problem and thereby guarantees that the abstract model also does not have any counter-examples up to depth k. Successive abstract models are similarly generated by solving BMC problems of increasing depth.
- [0006]In accordance with the present invention, system and methods are provided for verifying a digital design using dynamic abstraction.
- [0007]According to one embodiment, a method for verifying a digital system design is provided. A first abstraction of a digital system design is performed to obtain an abstract model of the digital system design. One or more first steps of a multiple-step model checking process are performed using the abstract model, the multiple-step model checking process being operable to verify the digital system design. During the multiple-step model checking process, a second abstraction is performed to refine the abstract model. One or more second steps of the multiple-step model checking process are then performed using the refined abstract model.
- [0008]According to another embodiment, logic for verifying a digital system design is provided. The logic is encoded in one or more media for execution using one or more processors and, when executed, is operable to perform a first abstraction to obtain an abstract model of a digital system design. The logic is further operable to perform one or more first steps of a multiple-step model checking process using the abstract model, the multiple-step model checking process operable to verify the digital system design. The logic is further operable to perform, during the multiple-step model checking process, a second abstraction to refine the abstract model, and to perform one or more second steps of the multiple-step model checking process using the refined abstract model.
- [0009]According to yet another embodiment, a system for verifying a digital system design is provided. The system includes an integrated abstraction and verification module. The integrated abstraction and verification module is operable to perform a first abstraction to obtain an abstract model of a digital system design, and to perform one or more first steps of a multiple-step model checking process using the abstract model, the multiple-step model checking process being operable to verify the digital system design. The integrated abstraction and verification module is operable to perform, during the multiple-step model checking process, a second abstraction to refine the abstract model, and to perform one or more second steps of the multiple-step model checking process using the refined abstract model.
- [0010]According to still another embodiment, another method for verifying a digital system design is provided. A model checking process including a plurality of steps is performed to verify a digital system design. The model checking process uses an abstract model of the digital system design that includes a plurality of logical state elements. After a portion of the plurality of steps, the abstract model is refined, and the model checking process is continued using the refined abstract model.
- [0011]According to still another embodiment, another system for verifying a digital system design is provided. The system includes means for performing a first abstraction to obtain an abstract model of a digital system design, and means for performing one or more first steps of a multiple-step model checking process using the abstract model, the multiple-step model checking process being operable to verify the digital system design. The system also includes means for performing, during the multiple-step model checking process, a second abstraction to refine the abstract model, and means for performing one or more second steps of the multiple-step model checking process using the refined abstract model.
- [0012]Various embodiments of the present invention may benefit from numerous advantages. It should be noted that one or more embodiments may benefit from some, none, or all of the advantages discussed below.
- [0013]Previous techniques for abstraction refinement work on static abstractions, in that the abstract model produced by the abstraction algorithm is not modified by the downstream model checking. In general, the present invention includes dynamic methods of abstraction, which can be applied during successive steps of the model checking algorithm to further abstract the model produced by traditional static abstraction methods. This is facilitated by information gathered from an analysis of the proof of unsatisfiability of SAT-based bounded model checking problems, solved on the concrete model, and passed to the model checker. It effectively allows the model checker to work with smaller abstract models. Such dynamic abstraction significantly improves the performance of the abstraction refinement flow and also enables the successful application of abstraction refinement-based model checking to larger designs.
- [0014]More particularly, when a property is checked on a circuit model using, for instance, a typical BDD-based symbolic model checker, there may be state elements that are “partially abstractable,” i.e., while the state element is necessary in the proof of the property, it may actually be required only in certain image computation steps. For example, there may be latches in a circuit design that are solely present for initialization purposes, i.e., for the purpose of proving the given property they effectively become redundant after a few steps of image computation.
- [0015]The present invention includes systems and methods of dynamic abstraction whereby the design under verification is abstracted during successive image computation steps of the model checking phase. This abstraction can be performed in addition to and after the abstraction through a traditional static abstraction algorithm. This provides for a more aggressive yet accurate abstraction methodology, effectively allowing the core model checking algorithm to work on smaller abstract models. In some embodiments, information regarding the dynamic abstractability of different latches is deduced from an analysis of the unsatisfiable core of SAT-based bounded model checking problems, solved on the concrete model, and passed to the model checker. An important benefit of such dynamic abstraction is that because it is tightly coupled to the model checker, feedback from the model checking process can be effectively used to guide the model checking process.
- [0016]As discussed above, traditional abstraction refinement techniques share two common features, namely (1) the abstraction step is algorithmically distinct from the model checking, i.e., the abstraction is performed outside the model checker, and (2) the abstraction is purely structural in nature and has no temporal component, i.e., the same structural abstraction is used for each image computation step in BDD-based model checking (or each unrolled time-frame in SAT-based BMC). The abstraction refinement techniques of the present invention can be distinguished from such traditional abstraction refinement techniques based on these two aspects. The abstraction refinement techniques of the present invention analyze the temporal behavior of various state elements (e.g. latches) and based on this analysis, dynamically abstracts sets of state elements (e.g. latches) during the course of the model checking. Thus, the abstraction and the model checking verification finctions are integrated. For example, in the case of a BDD-based model checker, successively more abstracted versions of the transition relation are used for successive image computation steps. The dynamic abstraction techniques of the present invention can be applied in addition to any abstraction performed by any traditional static abstraction methods. For example, the dynamic abstraction techniques of the present invention may be applied to both counter-example dependant and counter-example independent abstraction refinement frameworks.
- [0017]Other advantages will be readily apparent to one having ordinary skill in the art from the following figures, descriptions, and claims.
- [0018]For a more complete understanding of the present invention and for further features and advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
- [0019]
FIG. 1 illustrates a system for verifying a digital system design using dynamic abstraction techniques in accordance with one embodiment of the invention; - [0020]
FIG. 2 is a graphical representation of the proof of unsatisfiability (POU) from a 40-step SAT-BMC problem on an example circuit; - [0021]
FIG. 3 is a graph illustrating the redundancy indices (RIs) for four latches from an example digital system design, generated from the POUs of different BMC problems with varying depth k; - [0022]
FIG. 4 illustrates Table 1 indicating example experimental results from implementing a traditional static abstraction and a pair of dynamic abstraction heuristics to test an example digital system design; and - [0023]
FIG. 5 illustrates Table 2 indicating more detailed statistics of the BDD-model checking process for some representative benchmarks from Table 1 ofFIG. 4 ; and - [0024]
FIG. 6 illustrates a method of verifying a digital system design in accordance with an embodiment of the invention. - [0025]Example embodiments of the present invention and their advantages are best understood by referring now to
FIGS. 1 through 6 of the drawings, in which like numerals refer to like parts. - [0026]In general, systems and methods for verifying a digital design using dynamic abstraction in model checking processes are provided. Unlike traditional abstraction refinement techniques, which consist of static abstractions, the systems and methods provided herein include dynamic abstraction techniques, which can be applied during successive steps of a model checking algorithm to further abstract the model produced by traditional static abstraction techniques. In some embodiments, this dynamic abstraction is facilitated by information gathered from an analysis of the proof of unsatisfiability of SAT-based bounded model checking problems, solved on the concrete model, and passed to the model checker. The dynamic abstraction effectively allows the model checker to work with smaller abstract models, and significantly improves the performance of the abstraction refinement flow, and also enables the successful application of abstraction refinement-based model checking to larger designs.
- [0027]
FIG. 1 illustrates a system**10**for verifying a digital system design using dynamic abstraction techniques in accordance with one embodiment of the invention. System**10**includes a digital system design**12**coupled to an integrated abstraction and verification tool**14**. Digital system design**12**may comprise any portion or all of a digital hardware design, software application or code, or any other digital system or design, model, simulation, or other representation of a digital system. For example, digital system design**12**may be a software application, such as an email application, a game application, or an operating system, for example. As another example, digital system design**12**may be a computer-based model of a digital circuit for which verification of the circuit design is desired. Digital system design**12**may include any number and types of digital components, including any number and types of logical state elements, such as latches and gates, for example. - [0028]Integrated abstraction and verification tool
**14**includes an abstraction module**16**integrated with a verification module**18**. Abstraction module**16**is generally operable to perform abstractions of digital design**12**and abstraction refinement (i.e., abstractions of abstractions) functions. Verification module**18**, which may also be referred to as model checking module**18**, is generally operable to perform a verification of digital design**12**using abstractions generated by abstraction module**16**. In some embodiments, verification module**18**may provide BDD-based model checking functionality. As described in greater detail below, the abstraction refinement techniques provided by integrated abstraction and verification tool**14**analyze the temporal behavior of various state elements (e.g. latches) and based on this analysis, dynamically abstracts sets of state elements (e.g. latches) during the course of the model checking. Thus, unlike traditional abstraction refinement techniques, integrated abstraction and verification tool**14**provides abstraction refinement techniques in which (1) the abstraction steps are algorithmically integrated with the model checking, and (2) the abstraction has a temporal component such that different structural abstractions are used for different steps in the model checking process. As used herein, a “step” of a model checking process may refer to any component of the model checking process, such as an image computation step in BDD-based model checking, or an unrolled time-frame in SAT-based BMC, for example. - [0029]Integrated abstraction and verification tool
**14**, including abstraction module**16**and verification module**18**, may include any hardware, software, or embedded logic that can be utilized by a user to perform any of the functionality discussed herein with respect to the present invention. For example, Integrated abstraction and verification tool**14**may include one or more computer systems, or logic or software encoded in media which may be executed by one or more computer systems to perform the functionality discussed herein. The term “computer” refers to any suitable device operable to accept input, process the input according to predefined rules, and produce output, for example, a personal computer, workstation, network computer, one or more processors within these or other devices, or any other suitable processing device. - [0030]Particular embodiments of the functionality performed by integrated abstraction and verification tool
**14**are discussed below. - [0000]Abstraction Introduction
- [0031]The following discussion focuses on model checking of invariants, i.e., CTL properties of the form AGp where p is a Boolean expression on the variables of the given circuit model. The circuit under verification can be modeled as a sequential circuit M with primary inputs W={w
_{1}, w_{2}, . . . , w_{n}}, present state variables X={x_{1}, x_{2}, . . . , X_{m}} and the corresponding next state variables Y={y_{1}, y_{2}, . . .y_{m}}. Thus, M can be represented as M=<T(X, Y, W),I(X)>, where T(X, Y, W) is the transition relation and I(X) is the set of initial states (more precisely the characteristic function of the set of initial states). M has a set of latches (state elements) L={l_{1}, l_{2}, . . . , l_{m}}. Thus, x_{i }and y_{i }would be the present state and next state variables corresponding to latch l_{i}. The transition relation T is a conjunction of the transition relations of the individual latches. Thus,$T\left(X,Y,W\right)=\underset{i\in \left\{l\text{\hspace{1em}}\dots \text{\hspace{1em}}m\right\}}{\u2a53}{T}_{i}\left(X,{y}_{i},W\right)$

Here, T_{i}(X, y_{i},W)=y_{i}⇄Δ_{i}(X,W) is the transition relation of latch l_{i }and Δ_{i}(X, W) is its transition function in terms of primary inputs and present state variables. - [0032]Given a subset of latches L
_{abs}={l_{1}, l_{2}, . . . ,l_{q}}, L_{abs }__⊂__L , that a user would like to abstract away from the design, the abstracted model can be constructed by cutting open the feedback loop of latches L_{abs }at their present-state variables X_{abs}, i.e. making the variables X_{abs }primary inputs and removing the logic cones of the transition functions of latches L_{abs }from the circuit model. Functionally, the abstracted transition relation {circumflex over (T)} can be defined as:$\begin{array}{cc}\hat{T}\left(\hat{X},\hat{Y},\hat{W}\right)=\underset{i;{l}_{i}\in \hat{L}}{\u2a53}{\hat{T}}_{i}\left(\hat{X},{y}_{i},\hat{W}\right)& \left(1\right)\end{array}$ - [0033]where Ŵ=W ∪ X
_{abs}, {circumflex over (X)}=−X_{abs}, Ŷ={y_{i}:x_{i}∉{circumflex over (X)}}, and for all i such that y_{i}εŶ, {circumflex over (T)}({circumflex over (X)}, y_{i}, Ŵ)=T(X, y_{i}, W). - [0034]A concept that will be frequently used in the following treatment is that of the proof of unsatisfiability (POU) of a CNF SAT formula. As known in the art, certain modem SAT solvers can be modified to produce a proof of unsatisfiability when the CNF formula being solved is found to be unsatisfiable. The proof of unsatisfiability (denoted by P in the sequel) of a SAT CNF formula can be represented as a directed acyclic graph, the nodes of which are clauses and each node (other than the leaves) has precisely two children. The root of this graph is the empty clause and the leaves are clauses from the original CNF. All other nodes (including the root) such that they can be derived through a resolution operation on their two children clauses.
- [0035]A simplified version of the algorithm for abstraction refinement in some embodiments is shown as Algorithm 1.
Algorithm 1: Abstraction Refinement Using SAT-BMC 1: k = InitValue 2: if SAT-BMC (M, p, k) is SAT then 3: return “found error trace” 4: else 5: Extract proof of unsatisfiability, P of SAT-BMC 6: M′ = ABSTRACT (M,P) 7: end if 8: if MODEL_CHECK (M′, p) returns PASS then 9: return “passing property” 10: else 11: Increase bound k 12: goto Step 2 13: end if - [0036]The abstraction is based on the use of SAT-based bounded model checking (BMC). Let ν be a variable in the representation of the transition relation T. A k-step BMC problem is generated by unrolling and replicating T, k times. Let ν
^{1}, ν^{2}, . . . , ν^{k }denote the k instantiations of v in the unrolled BMC problem. The idea of the abstraction method is to solve k-step SAT-BMC problem on the original design and analyze the POU returned by the SAT solver to generate the abstraction. The POU is scanned to identify a set of latches Labs such that for each l ε L_{abs }the variables**1**^{1},**1**^{2}, . . . , l^{k }do not appear in any of the clauses of the POU. These latches can then be abstracted using Equation (1) (in the ABSTRACT operation in Step 6 of Algorithm 1). The rationale is that since these latches probably do not contribute to the property check in the first k time-frames, they might be irrelevant from the point of view of deciding this property for unbounded behaviors as well. - [0037]The model checking algorithm employed in Algorithm 1 (Step 8) may use a variety of methods. For simplicity of exposition we will assume a symbolic model checker using BDDs. However, our ideas can be applied to other methods, such as SAT-based induction or BMC, for example, in a fairly straightforward manner. Algorithm 2 shows the pseudo-code for a symbolic invariant checking algorithm that could use BDDs. Here, B denotes the “bad states,” i.e., states that violate p, and S
_{C }denotes the set of currently reached states. Basically, the algorithm computes the set of states reachable from the initial states checking intersection of S_{C }with B after each step. The core operation is the image operation Img, defined in Equation (2) below. It computes the states reachable in one step, via the transition relation T, from the current states S_{C}.

Img(Y)≡∃X,W.S_{c}(X)ˆT(X,Y,W) (2) - [0038]
Algorithm 2: Symbolic Invariant Checking Invariant Check (M<T,I>,B) 1: S _{C }= 0;S_{N }= I ;2: while S _{C }≠ S_{N }do3: S _{C }= S_{N};4: if B ∩ S _{C }≠ 0 then5: return “found error trace”; 6: end if 7. S _{N }= S_{C }∪ Img(S_{C});8: end while 9: return “no bad state reachable”;

Dynamic Abstraction - [0039]The dynamic abstraction technique of particular embodiment of the present invention is based on an analysis of the proof of unsatisfiability of a SAT-BMC problem solved on the concrete design.
- [0040]Given the original circuit M and the property P=AGp, suppose that a SAT-BMC problem of depth k has been solved on M and found no counter-example. Further, suppose that the SAT solver generates a proof of unsatisfiability P for this problem.
FIG. 2 is a graphical representation of the POU from a 40-step SAT-BMC problem on a real circuit example. For each latch (plotted for 40 representative latches on the y-axis) the plot shows the time-frames for which the corresponding instantiation of the latch variable appeared in the POU of the SAT-BMC problem. The latches have been sorted on the y-axis for better readability of the data. Given a latch variable lεL, we can define the “redundancy index,” p(l) of l, with respect to the proof P, as follows: - [0041]D
EFINITION 1 (REDUNDANCY INDEX ). The redundancy index p(l) of latch l with respect to the proof of unsatisfiability P is the smallest time-frame index such that for all time-frames j, p(l)≦j≦k, there does not exist a clause with variable I^{j }in P. - [0042]For example, in
FIG. 2 , the points marked A and B show that latch number**15**has a redundancy index of 15 and latch**32**has a redundancy index of 28. Simply put, the redundancy index is the earliest time-frame after which the given latch stops participating in the POU of the current BMC problem. The situation depicted inFIG. 2 is typical of a large variety of benchmarks that have been experimented with. Most latches are not used in all time-frames of the POU. Moreover, there are several latches that are only used in the first few time-frames. - [0043]In the following discussion, a result is developed which shows that latch l can be dynamically abstracted from the transition relation anytime after p(l) image computation steps in the invariant checking algorithm of Algorithm 2, and still have the model checking result match that of the BMC up to the first k steps.
- [0044]At each step of image computation a “candidate set” of latches can be defined, which is essentially the set of latches whose redundancy index is less than or equal to the index of the current image computation step.
- [0045]D
EFINITION 2 (CANDIDATE SET ). The candidate set of latches for iteration j of image computation in Algorithm 3.2 is denoted C_{j }and is defined as C_{j}={l_{i}:l_{i}εL, ρ(l_{i})≦j} - [0046]For example, in
FIG. 2 , the candidate set at time-frame**15**consists of the first 15 latches, i.e., C_{15}={l_{1}, l_{2}, . . . , l_{15}}. A modified version of Algorithm 2, incorporating dynamic abstraction, is provided below as Algorithm 3.Algorithm 3: Symbolic Invariant Checking with Dynamic Abstraction Invariant Check.Dynamic Abstract (M<T,I>B) 1: S _{C }= 0; S_{N }= I ;2: while S _{C }≠ S_{N }do3: L _{abs }= CHOOSE_ABSTRACTION_LATCHES(L);4: T = ABSTRACT_TR(L _{abs}, T);5: B = ∃X _{abs}.B ;6: S _{C }= S_{N};7: S _{C }= ∃X_{abs}.S_{C};8. if B ∩ S _{C }≠ 0 then9: return “found error trace”; 10: end if 11: S _{N }= S_{C }∪ Img(S_{C});12: end while 13: return “no bad state reachable”; - [0047]In Algorithm 3, X
_{abs }are the present state variables corresponding to the latches Labs chosen for abstraction, ABSTRACT _TR abstracts the chosen latches from the transition relation, as per Equation (1) and the operation CHOOSE _ABSTRACTION _LATCHES is a heuristic to choose a subset of the candidate latches of the current iteration (Definition 2), for abstraction. - [0048]Because the dynamic abstraction is developed from an analysis of the POU of a k-step SAT-BMC problem, the following result can be stated about the correctness of Algorithm 1:
- [0049]T
HEOREM 1. Algorithm 1 will not find a counter-example to the given property in the first k steps of image computation. - [0050]The proof of this result is based on the observation that the above dynamic abstraction implementation is equivalently implemented as SAT-BMC by unrolling T for k time-frames and cutting open the unrolled latches in the requisite time-frames that were abstracted by the dynamic abstraction algorithm during the image computation. The original POU P still applies to this abstracted BMC problem since the abstracted variables did not appear in it to begin with.
- [0051]Latch Selection Heuristic A key component of Algorithm 1 is the latch selection heuristic C
HOOSE _ABSTRACTION _LATCHES. This decides which latches, out of the current candidate set, should be abstracted at a given image computation step. In some embodiments, this heuristic can have a significant bearing on the overall performance of the algorithm. - [0052]The most aggressive approach would be to perform dynamic abstraction for all latches in the current candidate set and at the earliest possible time as indicated by the redundancy index (RI) of each latch. However, this approach may have several drawbacks. The following issues drive the choice of this heuristic
- [0053]Issue (1): How often to abstract latches: In the aggressive version of the heuristic described above, abstraction may need to be performed very frequently, in the most extreme case at every image computation step. Since the dynamic abstraction is implemented via quantification of next-state variables, from the transition relation (TR), the overhead can be significant. Thus, in embodiments in which the reduction of overhead (e.g. computational resources) is desired, a heuristic that limits the abstraction to a few image computation steps may be used.
- [0054]Issue (2): Extrapolating unbounded behavior from p(l): In abstraction based on POU of a k-step SAT-BMC we are trying to extrapolate unbounded behavior of a latch, with respect to the given property, based on its bounded behavior. Intuitively, a latch that was active only in the first few steps of the BMC (i.e. one that has a small RI), such as latch l
_{2 }inFIG. 2 , for example, is more likely to be inactive beyond k time-steps than one which was active up to k-**1**or k-**2**steps (i.e. one that has a large RI), such as latch l_{38 }inFIG. 2 , for example. This intuition is supported by the data shown inFIG. 3 . - [0055]
FIG. 3 is a graph illustrating the redundancy indices for four latches from an example design, generated from the POUs of different BMC problems with varying depth k. Apart from minor fluctuations, the RI values of each latch are remarkably consistent, despite having been derived from independent BMC runs of different depth. Of course this is not the case for every latch, an artifact of the intrinsic approximate nature of any abstraction refinement framework. However, such consistency in the RI values is observed for a large percentage of the latches actually abstracted by the algorithms of the presented invention. - [0056]Issue (3): Size and depth of the reachable state space: Abstraction of latches comes at the cost of enlarging the set of permissible behaviors of the circuit. This can potentially enlarge the reachable state space, result in larger BDDs for the reached state representation, and/or increase the depth of the reachability computation. This factor should be considered by the latch selection heuristic if possible.
- [0057]With the above criteria in mind, several heuristics have developed and tested for C
HOOSE _ABSTRACTION _LATCHES. Two heuristics were found to give a particularly desirable tradeoff between overheads and abstraction power. Other variants of these two heuristics may be used in other embodiments, such as embodiments in which different factors are important. - [0000]Heuristic 1: Dynamically abstract just once at [δ·k] time-steps, (where 0<δ<1), and abstract all latches in the candidate set at this point.
- [0058]The philosophy behind this heuristic is to minimize the overheads of abstraction by doing it only once (Issue (1) above) and being aggressive by choosing all candidates for abstraction. δ is kept fairly low to increase the likelihood of the latches being redundant for future image computations (in agreement with Issue (2) above). δ=0.2 was used in particular experiments but other small values are equally or similarly effective.
- [0059]Heuristic 2: Before the start of model checking analyze the proof P and gather a set of latches S={l:l εL, p(l)≦δ·k}. Every r steps of image computation, compute the set of latches N not in the support set of current reached state set BDD. If |S∩N|≧r abstract all latches in the set S∩N. Repeat every r image computation steps.
- [0060]The intuition behind using the set N is that the removal of such latches is less likely to cause a blow-up in the current step of image computation. This relates to Issue 3 discussed above. Parameter settings of δ=0.2, r=2, r=10 were used in particular experiments, but the heuristic is not sensitive to these particular settings.
- [0061]Qualitatively, Heuristic 1 is based on an aggressive one time application of dynamic abstraction whereas Heuristic 2 is a more conservative, and controlled application of dynamic abstraction. This distinction is illustrated by the example experiments discussed below in the “Experimental Results” section.
- [0000]Optimizations
- [0062]Discussed below are some inexpensive optimizations that can be used to further improve the performance of a model checking algorithm that performs dynamic abstraction as described above.
- [0063](1) Bypassing the Error-State Check: A simple corollary of Theorem 1 is the following:
- [0064]C
OROLLARY 1. The error state check B∩S_{c}≠0 (line**8**) in Algorithm 1 will always yield “false” in the first k iterations of the algorithm. - [0065]This simple result obviates the need to perform the error state intersection check (line
**8**of Algorithm 1) in the first k iterations of image computation. This check can be fairly expensive at deeper image computation steps and/or when the target states are not simply the negation of the property but an enlarged target computed through a few pre-image computation steps. For example, in case of benchmark P14 in Table 1 ofFIG. 4 , the error-state check at depth**11**cost more than a 1600 secs. Also, note that this result is equally applicable to frameworks that only use static abstraction. - [0066](2) Cone of Influence Reduction: An abstraction of some latches can create opportunities for further abstraction by applying a standard cone of influence (COI) reduction on the abstracted model. Optimization may be performed after each abstraction step in the dynamic abstraction algorithms of the present invention. The key point is that any subsequent abstraction due to the COI reduction does not increase the space of allowable behaviors of the design. Thus, the quality of the abstraction is not diminished in any way but the design becomes smaller and more tractable for the model checking.
- [0000]Experimental Results
- [0067]The dynamic abstraction algorithm described above, as well as a static abstraction algorithm, was implemented in C++ within a suitable VIS framework. POU extraction was extended to report the redundancy index (RI) for each latch. The downstream model checker was modified to take RIs of latches as inputs and can further abstract the statically abstracted model on the fly using particular latch selection heuristics. CUDD was used for the BDD-based computation, and Z
CHAFF was used as the SAT solver for BMC. The image computation used the IWLS95 method. The sift method of dynamic variable reordering was used for all BDD operations, and the image cluster size was set to 5000. - [0068]Integrated abstraction and verification tool
**14**was tested for safety properties on different modules from three real-life industrial designs, which contain 10463, 40055, and 16414 lines of RTL verilog code respectively. A commercial front-end parser was used to synthesize the verilog code and to extract the cone of influence (COI) for each property. All experiments were run on 1.5 GHz Pentium 4 machines with 1G RAM, running SuSe Linux. The time-out limit was set to 24 hours for all problems. The results of these example experiments are reported in Table 1 ofFIG. 4 . Column**2**of Table 1 indicates whether the property (except P**14**) is a passing property or the length of the shortest counterexample if it is a failing property. A question mark is shown for P**14**, since none of the methods could finish within 24 hours. Column**6**of Table 1 indicates the number of latches in the statically abstracted model. Column**7**indicates the cumulative CPU time, which includes both abstraction time and model checking time (including BMC). - [0069]Columns
**8**and**10**indicate the number of latches in the final dynamically abstracted model for Heuristics 1 and 2 respectively (see “Latch Selection Heuristic” section above) as well as the additional latches abstracted with respect to the static abstraction method. For example, the static abstraction was able to abstract a model with only**224**latches for property P**8**, for which the concrete model has**5468**latches. Dynamic heuristic 1 was able to further abstract**40**more latches away, and the final model had**184**latches. Similarly, dynamic heuristic 2 was able to abstract**23**more latches, and the final size of the model was**201**. Again, the reported time in column**9**and**11**are cumulative CPU times. For all time-out cases, the number of completed image computation steps is indicated. For example, for P**14**, dynamic heuristic 1 was able to compute 26 steps of images within 24 hours (without hitting bad states or reaching fix-point), while static abstraction and heuristic 2 could only finish**13**steps. Therefore, a better partial result was achieved by the dynamic approach 1 over the static approach and heuristic 2. - [0070]As shown in Table 1, dynamic heuristic 1 is extremely powerful in reducing the overall runtime, even though the number of additional abstracted latches is not very significant in some cases. For example, with only 10 additional latches abstracted away for P
**12**, heuristic 1 achieves over an order of magnitude speed-up compared to the pure static abstraction approach. Also for P**8**, heuristic 1 is able to reduce the overall time from 1198 seconds down to 305 seconds. However, as discussed in previous section, aggressive abstraction may potentially slow down the subsequent model checking. In our experiment, dynamic heuristic 1 does experience occasional slow-down. For example, heuristic 1 spent 145 seconds on P**4**, in which it took**174**steps of image computation to reach fix-point. On the other hand, both static abstraction and dynamic heuristic 2 needed only 51 steps of image computation to reach fixed-point in 68 seconds. As explained in the previous section, heuristic 2 is a more conservative and controlled application of dynamic abstraction. Heuristic 2 consistently outperforms the pure static abstraction for all or nearly all cases and has achieved significant speed-up on many of them. For example, it reduced the runtime for P**10**from 563 seconds down to 270 seconds. - [0071]Table 2 of
FIG. 5 illustrates more detailed statistics of the BDD-based model checking process for some representative benchmarks from Table 1 ofFIG. 4 . The columns of Table 2 represent the peak and final BDD sizes of the model checking for the each of the three methods. The results shown in Table 2 indicate that the two dynamic abstraction methods are able to significantly reduce the BDD sizes, which is consistent with the overall runtime gains reported in Table 1. For example, for P**11**dynamic 1 was able to reduce the number of peak nodes by over an order of magnitude and the number of final nodes by more than 5 times. - [0072]
FIG. 6 illustrates a method of verifying a digital system design in accordance with an embodiment of the invention. At step**100**, integrated abstraction and verification tool**14**receives a digital system design**12**to be verified. For example, integrated abstraction and verification tool**14**may be coupled to a digital hardware design or a software application to be verified. At step**102**, abstraction module**16**of tool**14**performs an abstraction of the digital system design received at step**100**to generate an abstract model, or abstraction, of the digital system design. For example, one or more state elements (such as latches or gates) may be abstracted from the digital system design. At step**104**, verification module**18**of tool**14**performs one or more steps of a BDD-based model checking process using the abstraction generated at step**102**. At step**106**, abstraction module**16**refines (or further abstracts) the abstraction generated at step**102**, such as by further abstracting one or more state elements (such as latches or gates) from the abstraction. At step**108**, verification module**18**continues the model checking process, performing one or more steps of the process using the refined abstraction generated at step**106**. In some embodiments, steps**106**-**108**may be repeated one or more times to further refine the abstraction used in the remaining steps of the model checking process. At step**110**, the model checking process completes, and various results of the model checking process may be displayed or otherwise output. - [0000]Conclusion
- [0073]Integrated abstraction and verification tool
**14**is operable to performing dynamic abstraction methods within a framework for abstraction refinement based model checking. In some embodiments, the dynamic abstraction is applied during successive image computation steps of the model checking algorithm and may be applied after and in addition to the abstraction performed by traditional static abstraction methods. The dynamic abstraction is facilitated by information gathered from an analysis of the proof of unsatisfiability of SAT-based bounded model checking problems, solved on the concrete model, and passed to the model checker. It effectively allows the model checker to work with smaller abstract models. Experiments performed on several large industrial benchmarks demonstrated that the dynamic abstraction strategies of the present invention improve the performance of a model checking flow based on abstraction refinement by up to an order of magnitude over what can be achieved with state-of-the-art static abstraction refinement methods and also enables the successful application of abstraction refinement based model checking to larger designs. - [0074]Although the presented framework is a complete method for abstraction refinement based model checking, the concept of dynamic abstraction of the present invention extends beyond the specific implementation presented herein and may be applied in any other suitable framework. For example, the notion of dynamic abstraction may be applied to other abstraction refinement frameworks incorporating a variety of model checking techniques and other heuristics for static abstraction.
- [0075]Although an embodiment of the invention and its advantages are described in detail, a person skilled in the art could make various alterations, additions, and omissions without departing from the spirit and scope of the present invention as defined by the appended claims.

Patent Citations

Cited Patent | Filing date | Publication date | Applicant | Title |
---|---|---|---|---|

US5953519 * | Jun 12, 1996 | Sep 14, 1999 | Fura; David A. | Method and system for generating electronic hardware simulation models |

US6643827 * | Sep 30, 2000 | Nov 4, 2003 | Intel Corporation | Symbolic model checking with dynamic model pruning |

US6728939 * | Jan 8, 2002 | Apr 27, 2004 | Siemens Aktiengesellschaft | Method of circuit verification in digital design |

US6957404 * | Dec 20, 2002 | Oct 18, 2005 | International Business Machines Corporation | Model checking with layered localization reduction |

US20040153308 * | Feb 3, 2003 | Aug 5, 2004 | Mcmillan Kenneth L. | Method and system for design verification using proof-based abstraction |

US20050086648 * | Feb 13, 2004 | Apr 21, 2005 | Microsoft Corporation | Object-based systematic state space exploration of software |

US20050114809 * | Apr 29, 2004 | May 26, 2005 | Yuan Lu | Design verification using formal techniques |

US20050210433 * | May 6, 2005 | Sep 22, 2005 | Clarke Edmund M | Method and system to check correspondence between different representations of a circuit |

US20060190864 * | Jan 18, 2005 | Aug 24, 2006 | Nec Laboratories America, Inc. | Efficient modeling of embedded memories in bounded memory checking |

Referenced by

Citing Patent | Filing date | Publication date | Applicant | Title |
---|---|---|---|---|

US7343575 * | May 5, 2005 | Mar 11, 2008 | Synopsys, Inc. | Phase abstraction for formal verification |

US7392492 * | Sep 30, 2005 | Jun 24, 2008 | Rambus Inc. | Multi-format consistency checking tool |

US7458046 * | Jul 19, 2005 | Nov 25, 2008 | Fujitsu Limited | Estimating the difficulty level of a formal verification problem |

US7519931 * | Oct 13, 2008 | Apr 14, 2009 | International Business Machines Corporation | Applying CNF simplification techniques for SAT-based abstraction refinement |

US7571398 | Jul 24, 2006 | Aug 4, 2009 | Bormann Joerg | Method for the determination of the quality of a set of properties, usable for the verification and specification of circuits |

US7890894 | Jan 16, 2008 | Feb 15, 2011 | Synopsys, Inc. | Phase abstraction for formal verification |

US8032848 | Jan 29, 2009 | Oct 4, 2011 | Synopsys, Inc. | Performing abstraction-refinement using a lower-bound-distance to verify the functionality of a circuit design |

US8073798 | Oct 30, 2007 | Dec 6, 2011 | Palo Alto Research Center Incorporated | Dynamic domain abstraction through meta-analysis |

US8166430 | Jun 22, 2009 | Apr 24, 2012 | Onespin Solutions Gmbh | Method for determining the quality of a quantity of properties, to be employed for verifying and specifying circuits |

US8181132 * | Apr 30, 2009 | May 15, 2012 | Fujitsu Limited | Validating one or more circuits using one or more grids |

US8554522 * | Dec 16, 2009 | Oct 8, 2013 | International Business Machines Corporation | Detection of design redundancy |

US8966312 * | Aug 9, 2013 | Feb 24, 2015 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |

US20060253815 * | May 5, 2005 | Nov 9, 2006 | Synopsys, Inc. | Phase abstraction for formal verification |

US20070022394 * | Jul 19, 2005 | Jan 25, 2007 | Fujitsu Limited | Estimating the difficulty level of a formal verification problem |

US20070079267 * | Sep 30, 2005 | Apr 5, 2007 | Qiang Hong | Multi-format consistency checking tool |

US20070226663 * | Jul 24, 2006 | Sep 27, 2007 | Bormann Joerg | Method for the determination of the quality of a set of properties, usable for the verification and specification of circuits |

US20080134114 * | Jan 16, 2008 | Jun 5, 2008 | Synopsys, Inc. | Phase Abstraction For Formal Verification |

US20080263487 * | Jun 23, 2008 | Oct 23, 2008 | Qiang Hong | Multi-Format Consistency Checking Tool |

US20080294582 * | Oct 30, 2007 | Nov 27, 2008 | Palo Alto Research Center Incorporated | Dynamic domain abstraction through meta-analysis |

US20090089618 * | Oct 1, 2007 | Apr 2, 2009 | Fujitsu Limited | System and Method for Providing Automatic Test Generation for Web Applications |

US20090210212 * | Apr 30, 2009 | Aug 20, 2009 | Fujitsu Limited | Validating One or More Circuits Using One or More Grids |

US20090327984 * | Jun 22, 2009 | Dec 31, 2009 | Jorg Bormann | Method For Determining The Quality Of A Quantity Of Properties, To Be Employed For Verifying And Specifying Circuits |

US20100192114 * | Jan 29, 2009 | Jul 29, 2010 | Synopsys, Inc. | Method and apparatus for performing abstraction-refinement using a lower-bound-distance |

US20110144958 * | Dec 16, 2009 | Jun 16, 2011 | International Business Machines Corporation | Detection of design redundancy |

US20140330758 * | May 3, 2013 | Nov 6, 2014 | Synopsys, Inc. | Formal verification result prediction |

WO2010088142A3 * | Jan 22, 2010 | Nov 4, 2010 | Synopsys, Inc. | Method and apparatus for performing abstraction-refinement using a lower-bound-distance |

Classifications

U.S. Classification | 716/106 |

International Classification | G06F17/50 |

Cooperative Classification | G06F17/504 |

European Classification | G06F17/50C7 |

Legal Events

Date | Code | Event | Description |
---|---|---|---|

Mar 17, 2005 | AS | Assignment | Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PRASAD, MUKUL R.;REEL/FRAME:016394/0099 Effective date: 20050316 |

Jun 2, 2009 | CC | Certificate of correction | |

Mar 30, 2011 | FPAY | Fee payment | Year of fee payment: 4 |

Jun 12, 2015 | REMI | Maintenance fee reminder mailed | |

Oct 30, 2015 | LAPS | Lapse for failure to pay maintenance fees | |

Dec 22, 2015 | FP | Expired due to failure to pay maintenance fee | Effective date: 20151030 |

Rotate